Evaluating wireless network access connections via near field communications, including: identifying, by a requesting device, one or more network connections available to the requesting device; requesting, by the requesting device to one or more responding devices using a near field communications connection, information describing the performance of the network connections experienced by the one or more responding devices; receiving, by the requesting device, the information describing the performance of the network connections experienced by the one or more responding devices; and connecting, by the requesting device, to a preferred network connection in dependence upon the information describing the performance of the network connections experienced by the one or more responding devices.
|
1. A method evaluating wireless network access connections via near field communications, the method comprising:
identifying, by a requesting device, one or more network connections available to the requesting device;
requesting, by the requesting device to one or more responding devices using a near field communications connection, information describing the performance of the network connections experienced by the one or more responding devices;
receiving, by the requesting device, the information describing the performance of the network connections experienced by the one or more responding devices;
identifying, by the requesting device, in dependence upon the information describing the performance of the network connections experienced by the one or more responding device, responding devices of the one or more responding devices that can provide reliable access to a particular network resource; and
connecting, by the requesting device, to a preferred network connection in dependence upon the information describing the performance of the network connections experienced by the identified responding devices of the one or more responding devices that can provide reliable access to the particular network resource.
2. The method of
3. The method of
4. The method of
5. The method of
6. The method of
7. The method of
8. The method of
9. The method of
10. The method of
|
This application is a continuation application of and claims priority from U.S. patent application Ser. No. 13/629,833, filed on Sep. 28, 2012.
Field of the Invention
The field of the invention is data processing, or, more specifically, methods, apparatus, and products for evaluating wireless network access connections via near field communications.
Description of Related Art
Modern computing devices are able to connect to data communications in a variety of ways. Computing devices may connect to data communications using wired connections and wireless connections. Computing devices that connect to data communications networks using wireless connections may identify a plurality of potential access points for wirelessly connecting to a data communications network. Many computing devices will select a particular access point to connect to the data communications network based on criteria such as signal strength, with no understanding of the actual quality of service that will be delivered through such a connection.
Methods, apparatus, and products for evaluating wireless network access connections via near field communications, including: identifying, by a requesting device, one or more network connections available to the requesting device; requesting, by the requesting device to one or more responding devices using a near field communications connection, information describing the performance of the network connections experienced by the one or more responding devices; receiving, by the requesting device, the information describing the performance of the network connections experienced by the one or more responding devices; and connecting, by the requesting device, to a preferred network connection in dependence upon the information describing the performance of the network connections experienced by the one or more responding devices.
The foregoing and other objects, features and advantages of the invention will be apparent from the following more particular descriptions of example embodiments of the invention as illustrated in the accompanying drawings wherein like reference numbers generally represent like parts of example embodiments of the invention.
Example methods, apparatus, and products for evaluating wireless network access connections via near field communications in accordance with the present invention are described with reference to the accompanying drawings, beginning with
The example requesting device (202) of
The requesting device (202) of
The wireless network evaluation module (126) of
The wireless network evaluation module (126) of
The physical distance over which a requesting device (202) can communicate with one or more responding devices (224a, 224b) via a near field communications connection (228a, 228b) is frequently much shorter than the physical distance over which a requesting device (202) can communicate with a wireless access point via the one or more network connections available to the requesting device (202). As such, responding devices (224a, 224b) that are close enough in physical proximity to the requesting device (202) so as to communicate with the requesting device (202) via a near field communications connection (228a, 228b) may serve as reliable sources of information regarding the level and quality of network connectivity that the requesting device (202) could experience if the requesting device (202) were to connect to the same wireless access point as the responding devices (224a, 224b).
Consider an example in which the requesting device (202) and the responding devices (224a, 224b) are laptop computers that include wireless network adapters. In such an example, assume that each device (202, 224a, 224b) are located in the same physical conference room such that the devices (202, 224a, 224b) can communicate via one or more near field communications connections (228a, 228b). Further assume that responding device (224a) is connected to wireless access point A and that responding device (224b) is connected to wireless access point B. Because the responding devices (224a, 224b) are relatively close in physical proximity to the requesting device (202), as evidenced by the fact that the devices (202, 224a, 224b) can communicate via one or more near field communications connections (228a, 228b), it is reasonable for the requesting device (202) to assume that it will experience a similar level of network connectivity when connecting to wireless access point A as is experienced by responding device (224a). Likewise, it is also reasonable for the requesting device (202) to assume that it will experience a similar level of network connectivity when connecting to wireless access point B as is experienced by responding device (224b). As such, the responding devices (224a, 224b) may serve as reliable sources of information regarding the level and quality of network connectivity that the requesting device (202) could experience if the requesting device (202) were to connect to the same wireless access point as the responding devices (224a, 224b).
Requesting information describing the performance of the network connections experienced by the one or more responding devices (224a, 224b) can include sending a request message (220a, 220b) that includes information (222a, 222b) describing the requesting device (202) and information (223a, 223b) identifying network resources (226) to be accessed by the requesting device (202). The information (222a, 222b) describing the requesting device (202) can include, for example, the type of network adapters installed on the requesting device (202), the location of the requesting device (202), and information describing various credentials associated with the requesting device (202). Such information describing various credentials associated with the requesting device (202) can include, for example, information identifying the virtual private networks (‘VPNs’) that the requesting device (202) is authorized to access, information identifying secure network resources that the requesting device (202) is authorized to access, and so on. The information (223a, 223b) identifying network resources (226) to be accessed by the requesting device (202) can include, for example, an identifier of the network resources (226) to be accessed by the requesting device (202), a network address for the network resources (226) to be accessed by the requesting device (202), and the like.
The wireless network evaluation module (126) of
The information describing the performance of the network connections experienced by the one or more responding devices (224a, 224b) can include information describing the one or more responding devices (224a, 224b). The information describing the one or more responding devices (224a, 224b) can include, for example, the type of network adapters installed on the responding devices (224a, 224b), the location of the responding devices (224a, 224b), and information describing various credentials associated with the responding devices (224a, 224b). Such information describing various credentials associated with the responding devices (224a, 224b) can include, for example, information identifying the VPNs that the responding devices (224a, 224b) is authorized to access, information identifying secure network resources that the responding devices (224a, 224b) is authorized to access, and so on.
Consider an example in which the requesting device (202) needs to access a protected network resource (226) that is only accessible by members of a particular group. In such an example, assume that the requesting device (202) therefore requests information describing the extent to which the protected network resource (226) can be accessed by one or more responding devices (224a, 224b) via a network connection that is being used by each of the one or more responding devices (224a, 224b). Further assume that a particular responding device (224a) is not a member of the particular group that can access the network resource (226). In such an example, the responding device (224a) will indicate that it is not able to access the network resource (226) over the network connection that is being used by the responding device (224a). The fact that the responding device (224a) is not able to access the network resource (226) over the network connection that is being used by the responding device (224a), however, is not an indication that the network connection that is being used by the responding device (224a) cannot provide reliable access to the network resource (226). By receiving information (214, 218) describing the one or more responding devices (224a, 224b), the requesting device (202) may be able to identify the responding devices (224a, 224b) whose information (212, 216) describing the performance of the network connections experienced by the one or more responding devices (224a, 224b) should be considered for the purposes of identifying a preferred network connection. In the example described above, the requesting device (202) may simply ignore the information describing the performance of the network connections experienced by the one or more responding devices (224a, 224b) for those responding devices (224a, 224b) that do not have access to a particular network resource (226) by virtue of a lack of credentials.
The information describing the performance of the network connections experienced by the one or more responding devices (224a, 224b) can also include information describing availability to a particular network resource (226). The availability to a particular network resource (226) may include, for example, information identifying the bandwidth that a responding device (224a, 224b) could transfer information to and from the network resource (226) over its network connection, the percentage of time that the responding device (224a, 224b) could transfer information to and from the network resource (226) over its network connection, the number of network hops that were required for the responding device (224a, 224b) to transfer information to and from the network resource (226) over its network connection, and so on. In such an example, the information describing the availability to a particular network resource (226) from the perspective of a responding device (224a, 224b) that is utilizing a particular network connection may be of particular interest to the requesting device (202), for example, if the requesting device (202) is establishing a network connection to access the particular network resource (226).
Consider an example in which the requesting device (202) is attempting to access a particular database located on a particular network resource (226). In such an example, the extent to which the one or more responding devices (224a, 224b) are able to access the database located on a particular network resource (226) via their network connections if of particular interest to the requesting device (202), whereas the extent to which the one or more responding devices (224a, 224b) are able to access another network resource is of less interest to the requesting device (202). By receiving information describing availability to a particular network resource (226), the requesting device (202) may therefore utilize this information when evaluating the network connections utilized by the one or more responding devices (224a, 224b).
The wireless network evaluation module (126) of
Also stored in RAM (168) of the requesting device (202) is an operating system (154). Operating systems useful evaluating wireless network access connections via near field communications according to embodiments of the present invention include UNIX™, Linux™, Microsoft XP™, AIX™, IBM's i5/OS™, and others as will occur to those of skill in the art. The operating system (154) and the wireless network evaluation module (126) in the example of
The requesting device (202) of
The example requesting device (202) of
For further explanation,
The example method of
The example method of
In the example method of
Consider an example in which the requesting device (202) and the responding devices (224a, 224b) are laptop computers that include wireless network adapters. In such an example, assume that each device (202, 224a, 224b) are located in the same physical conference room such that the devices (202, 224a, 224b) can communicate via one or more near field communications connections (228a, 228b). Further assume that responding device (224a) is connected to wireless access point A and that responding device (224b) is connected to wireless access point B. Because the responding devices (224a, 224b) are relatively close in physical proximity to the requesting device (202), as evidenced by the fact that the devices (202, 224a, 224b) can communicate via one or more near field communications connections (228a, 228b), it is reasonable for the requesting device (202) to assume that it will experience a similar level of network connectivity when connecting to wireless access point A as is experienced by responding device (224a). Likewise, it is also reasonable for the requesting device (202) to assume that it will experience a similar level of network connectivity when connecting to wireless access point B as is experienced by responding device (224b). As such, the responding devices (224a, 224b) may serve as reliable sources of information regarding the level and quality of network connectivity that the requesting device (202) could experience if the requesting device (202) were to connect to the same wireless access point as the responding devices (224a, 224b).
In the example method of
The example method of
In the example method of
Consider an example in which the requesting device (202) needs to access a protected network resource (226) that is only accessible by members of a particular group. In such an example, assume that the requesting device (202) therefore requests information describing the extent to which the protected network resource (226) can be accessed by one or more responding devices (224a, 224b) via a network connection that is being used by each of the one or more responding devices (224a, 224b). Further assume that a particular responding device (224a) is not a member of the particular group that can access the network resource (226). In such an example, the responding device (224a) will indicate that it is not able to access the network resource (226) over the network connection that is being used by the responding device (224a). The fact that the responding device (224a) is not able to access the network resource (226) over the network connection that is being used by the responding device (224a), however, is not an indication that the network connection that is being used by the responding device (224a) cannot provide reliable access to the network resource (226). By receiving information (214, 218) describing the one or more responding devices (224a, 224b), the requesting device (202) may be able to identify the responding devices (224a, 224b) whose information (212, 216) describing the performance of the network connections experienced by the one or more responding devices (224a, 224b) should be considered for the purposes of identifying a preferred network connection. In the example described above, the requesting device (202) may simply ignore the information (212, 216) describing the performance of the network connections experienced by the one or more responding devices (224a, 224b) for those responding devices (224a, 224b) that do not have access to a particular network resource (226) by virtue of a lack of credentials.
In the example method of
Consider an example in which the requesting device (202) is attempting to access a particular database located on a particular network resource (226). In such an example, the extent to which the one or more responding devices (224a, 224b) are able to access the database located on a particular network resource (226) via their network connections if of particular interest to the requesting device (202), whereas the extent to which the one or more responding devices (224a, 224b) are able to access another network resource is of less interest to the requesting device (202). By receiving information (215, 219) describing availability to a particular network resource (226), the requesting device (202) may therefore utilize this information (215, 219) when evaluating the network connections utilized by the one or more responding devices (224a, 224b).
The example method of
For further explanation,
In the example method of
In the example method of
Consider an example in which a user of requesting device (202) intends to stream live video content to the requesting device. In such an example, connections that provide for low levels of bandwidth are entirely inadequate for such an activity, regardless of network reliability and other considerations. The data transfer rate associated with various connections, as contained in the information (212, 216) describing the performance of the network connections experienced by the one or more responding devices (224a, 224b), may therefore be compared to a predetermined threshold such that only those connections that provide the requisite bandwidth will be candidate connections for the requesting device (202). Other criteria that may be compared to the predetermined threshold can include, for example, availability of a predetermined network resource (226), network reliability ratings, and others as will occur to those of skill in the art.
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
Aspects of the present invention are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
It will be understood from the foregoing description that modifications and changes may be made in various embodiments of the present invention without departing from its true spirit. The descriptions in this specification are for purposes of illustration only and are not to be construed in a limiting sense. The scope of the present invention is limited only by the language of the following claims.
Cudak, Gary D., Hardee, Christopher J., Humes, Randall C., Roberts, Adam
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
7793352, | Nov 28 2002 | Meta Platforms, Inc | Sharing network access capacities across internet service providers |
8116679, | Sep 15 2008 | Sony Corporation | WLAN connection facilitated via near field communication |
8184560, | Feb 18 2010 | AT&T MOBILITY II LLC | Systems and methods for managing PDP contexts in a wireless data communications network |
20040116073, | |||
20060045050, | |||
20060045051, | |||
20060183462, | |||
20080002758, | |||
20080026768, | |||
20110161974, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Sep 27 2012 | CUDAK, GARY D | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 029913 | /0840 | |
Sep 27 2012 | HARDEE, CHRISTOPHER J | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 029913 | /0840 | |
Sep 27 2012 | HUMES, RANDALL C | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 029913 | /0840 | |
Sep 27 2012 | ROBERTS, ADAM | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 029913 | /0840 | |
Oct 24 2012 | International Business Machines Corporation | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Jul 17 2020 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Oct 21 2024 | REM: Maintenance Fee Reminder Mailed. |
Date | Maintenance Schedule |
Feb 28 2020 | 4 years fee payment window open |
Aug 28 2020 | 6 months grace period start (w surcharge) |
Feb 28 2021 | patent expiry (for year 4) |
Feb 28 2023 | 2 years to revive unintentionally abandoned end. (for year 4) |
Feb 28 2024 | 8 years fee payment window open |
Aug 28 2024 | 6 months grace period start (w surcharge) |
Feb 28 2025 | patent expiry (for year 8) |
Feb 28 2027 | 2 years to revive unintentionally abandoned end. (for year 8) |
Feb 28 2028 | 12 years fee payment window open |
Aug 28 2028 | 6 months grace period start (w surcharge) |
Feb 28 2029 | patent expiry (for year 12) |
Feb 28 2031 | 2 years to revive unintentionally abandoned end. (for year 12) |